
Registered since September 28th, 2017
Has a total of 4281 bookmarks.
Showing top Tags within 1 bookmarks
howto information development guide reference administration design website software solution online service product business uk tool company linux code server application system web list video marine create data experience tutorial description explanation learn technology build article blog world project boat download windows lookup security free performance javascript technical london beautiful control network tools support course file research purchase image library programming youtube example php construction install opensource community html quality computer feature profile power browser music platform process mobile work user share manage professional database hardware buy industry advice internet dance developer installation camera search 3d access customer travel material standard money test develop review documentation css engineering photography engine webdesign device digital speed event api source management question program client phone discussion content simple story water marketing yacht app account setup interface package idea fast communication compare cheap script market study easy live google resource operation demonstration contact startup
Tag selected: chinese wall.
Looking up chinese wall tag. Showing 1 results. Clear
Saved by uncleflo on September 7th, 2014.
Another concept is that of Chinese Walls, a security model that is also referred to as [the Brewer and Nash Model][8]. From their paper, the model can be described within a database organization as three intermittent levels. At the lowest level, we consider individual items of information, each concerning a single corporation. In keeping with BLP, we will refer to the files in which such information is stored as objects. At the intermediate level, we group all objects which concern the same corporation together into what we will call a company dataset. At the highest level, we group together all company datasets whose corporations are in competition. We will refer to each such group as a conflict of interest class.
chinese wall policy security chinese wall brewer narsh paper pdf information administration system control enforce corporation implementation institution organization level access object implement
No further bookmarks found.